Protect Against Russia-Ukraine Cyber Activity
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Consulting
  • More
  • AU
    Language
  • Contact Us
  • Resources
  • Get support
  • Get Started

Cyber Threat Report: Reconnaissance 2.0

  • Download
Oct 25, 2018 at 09:00 AM

 

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.

 


Customer Case Study

Domain Group

Australian Media Giant Secures Its Publishing Enterprise in the Cloud with Palo Alto Networks.

August 16, 2017
  • 276

Datasheet

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data

May 6, 2020
  • 15878

White Paper

Maximize the ROI of Detection and Response

Download this white paper to learn how to maximize the ROI and cut the cost of detection and response.

September 30, 2019
  • 191

White Paper

Simplify Zero Trust Implementation Using A Five-Step Methodology

Building Zero Trust networks is actually simpler than building legacy networks. This 5-step methodology makes deploying Zero Trust networks manageable, cost effective and non-disruptive.

September 23, 2019
  • 243

Datasheet

Managed Detection and Response

Accelerate your security operations’ maturity with our industry-leading MDR partners, powered by Cortex XDR™. Their expertise and resources relieve your day-to-day burden with 24/7 proactive alert management, threat hunting and incident response that spans network, endpoint and cloud. Our partners will get you up and running in weeks, not years, with SLAs that guarantee immediate reduction of MTTD and MTTR to under 60 minutes.

January 3, 2020
  • 1321

Datasheet

Traps Technical Overview

Palo Alto Networks® Traps™ advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Traps minimizes endpoint infections by blocking malware, exploits and ransomware. Integration with your security platform delivers additional threat analysis, shared intelligence and automated containment.

September 15, 2018
  • 297

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube

Copyright © 2022 Palo Alto Networks. All rights reserved